Official review finds increased espionage in electronics that can withstand radiation events. By Rachel Oswald

The Pentagon has documented a sharp increase in military espionage from the Asia-Pacific region that focuses on specialized electronics designed to withstand radiation, such as that caused by nuclear warfare or accidents, according to an official review released last week.

For a number of years, foreign entities from East Asia and the Pacific “have demonstrated a strong interest in obtaining export-controlled U.S. rad-hard circuitry,” states the report by the Pentagon’s Defense Security Service, referring to radiation-hardened electronics.

Radiation hardening is a process by which electric components are made to withstand the effects of ionizing radiation released in a nuclear explosion, by commercial atomic reactors or the sun.

These strengthened circuits “have applications in nuclear weapons, aerospace vehicles, ballistic missiles, and other electronics used in environments subject to radiation,” the review reads.

Subscribe

Receive daily email updates:

Subscribe to the Defense One daily.

Be the first to receive updates.

A number of Asia-Pacific nations with growing space programs could be motivated to seek out information about radiation-resistant technology.

The fiscal 2012 DSS report did not specifically single out China as the principal culprit behind this type of spying. However, it is generally understood that Beijing is the biggest perpetrator of digital espionage in the region and is also keenly interested in improving its own strategic military capabilities.

The Chinese People’s Liberation Army is believed to be concerned about the possibility of an atomic electromagnetic pulse attack — that is, one aimed at neutralizing its nuclear deterrent or other strategic assets that rely on electronics to operate. Additionally, China could be developing EMP weapons of its own, according to a declassified 2005 U.S. Army intelligence report.

North Korea may similarly take an interest in protecting its ballistic missiles from an EMP strike; however, the isolated nation is not believed to conduct weapons espionage to the degree that China does.

In a strike optimized for electromagnetic pulse, a nuclear warhead would be detonated far above a country. The attack could send out large amounts of radiation with the intention of confusing or simply frying the electrical systems below, including those used to run weapon systems. Some U.S. lawmakers worry about the possibility of the United States coming under this form of disruptive assault.

An alternative explanation for the intense Asia-Pacific interest is that a number of nations there with developing space capabilities likely would be interested in making sure their space-based systems are built to withstand things like solar flares and cosmic rays, according to the report. Australia, China, Japan, and South Korea all have space programs of varying size and ambitions.

The Defense Security Service, which works to limit unauthorized access to U.S. weapon system details, found that rad-hard electronics “will very likely remain highly sought after” in the future.

More broadly, the Pentagon organization has seen a major uptick in espionage efforts by Asian nations aimed at gaining backdoor knowledge of U.S. missile systems.

From fiscal 2011 to fiscal 2012, defense contractors working on U.S. missile programs self-reported an 86 percent increase in instances of attempted foreign espionage. Of these attempts, more than half came from organizations connected to the Asia-Pacific region, the Defense Security Service said.

Among the U.S. missile systems targeted in fiscal 2012 by intelligence collectors in this region were the submarine-launched Trident ballistic missile, the tactical Tomahawk missile, the Standard Missile 3 interceptor, the Patriot Advanced Capability 3 interceptor and the Ground Based Interceptor, according to the DSS report.

In its tracking of foreign espionage efforts, the Pentagon branch cites a number of espionage efforts under the umbrella of “collection activities.” These methods include cyber spying, attempts to acquire technology, outright requests for technical information, and foreign visits.

For the first time ever in fiscal 2012, cyber sleuthing — termed “suspicious network activity” in the report — was the No.1 collection method used by foreign organizations. It supplanted in rank both attempted acquisition and requests for information, which were the first and second most preferred methods, respectively, in fiscal 2011.

What is particularly troubling to the U.S. military about this change is that it has become more difficult to detect spying when it occurs; cyber espionage is harder to track than the more traditional spying methods.

“These changes meant that more direct and transparent methods were increasingly displaced by more indirect and opaque methods,” the DSS office found.

Rachel Oswald is a reporter for Global Security Newswire, where she covers a wide range of defense issues, including North Korea and missile defense. Prior to joining GSN in 2009, Rachel covered Georgia politics and local government for more than two years at The Covington News, where she won four ...
Full bio

By using this service you agree not to post material that is obscene, harassing, defamatory, or
otherwise objectionable. Although Defenseone.com does not monitor comments posted to this site (and
has no obligation to), it reserves the right to delete, edit, or move any material that it deems
to be in violation of this rule.

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

Federal IT Applications: Assessing Government's Core Drivers

In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and
effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.